Presentation | 2010-11-05 Determining granularity of URL filtering based on tree structure of malicious website URL Mitsuaki AKIYAMA, Takeshi YAGI, Mitsutaka ITOH, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious websites that cause various security incidents (e.g., malware infection). However, malicious URLs on that websites tend to partially mutate sub string of the URL and be short time-to-live. In this paper, focusing on the tendency of a URL mutation caused by malicious websites, we propose dynamically determining granularity of blacklisting URL for effective filtering. Our proposed method considers anomalous tree structure of malicious URLs, and extracts a common subtree of URLs. We assume that a filtering based on this subtree of URLs covers mutated URL caused by an adversary in a short period. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | malicious website / drive-by-download / blacklist |
Paper # | ICSS2010-53 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2010/10/29(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Determining granularity of URL filtering based on tree structure of malicious website URL |
Sub Title (in English) | |
Keyword(1) | malicious website |
Keyword(2) | drive-by-download |
Keyword(3) | blacklist |
1st Author's Name | Mitsuaki AKIYAMA |
1st Author's Affiliation | NTT corporation() |
2nd Author's Name | Takeshi YAGI |
2nd Author's Affiliation | NTT corporation |
3rd Author's Name | Mitsutaka ITOH |
3rd Author's Affiliation | NTT corporation |
Date | 2010-11-05 |
Paper # | ICSS2010-53 |
Volume (vol) | vol.110 |
Number (no) | 266 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |